Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity NewsHospitality & Casinos

New Malware Campaign Targeting Hospitality Sector

By Jordyn Alger, Managing Editor
Hotel hallway
runnyrem via Unsplash
January 8, 2026

Securonix researchers warn of a new campaign targeting the hospitality sector, deceiving users into pasting malicious code.

This campaign, tracked as tracked as PHALT#BLYX, is an infection chain with multiple stages, leveraging click-fix social engineering, a false CAPTCHA, and false “blue screen of death,” or BSOD. Malicious actors gain initial access by tricking targets with a false cancellation of a booking.com reservation. 

The booking.com lure contains a link leading to a fraudulent website. The website presents a false CAPTCHA, leading to a false BSOD. “It is a trick for click-fix that executes a PowerShell command to download a proj file,” the research states. “The campaign leverages MSBuild.exe to compile and execute the payload. The final payload is a heavily obfuscated version of DCRat, capable of process hollowing, keylogging, persistent remote access and to drop secondary payloads.”

According to the research, “The attackers utilize booking.com, a theme that has been abused in the past and remains a persistent threat. The phishing emails notably feature room charge details in Euros, suggesting the campaign is actively targeting European organisations. The use of Russian language within the ‘v.project’ MS build file links this activity to Russian threat factors using DCRat.” 

Below, security leaders discuss this new malware campaign. 

Security Leaders Weigh In 

Christopher Jess, Senior R&D Manager at Black Duck:

This PHALT#BLYX activity is a good example of where attackers don’t require a vulnerability for exploitation. By combining a fake booking.com cancellation lure with a bogus CAPTCHA and a panic-inducing BSOD, the campaign uses the click-fix pattern to coax a user into running PowerShell themselves, then leans on built in tools by abusing trusted Windows tooling like MSBuild.exe to compile and run the next stage. That blend of social engineering plus utilizing legitimate binaries is specifically designed to slip past conventional controls that are tuned for clearly malicious executables. 

Organizations should assume this technique will spread. Click-fix has already shown broad adoption across threat actors, lures, and geographies because it’s low cost to retheme and it relies on user execution rather than a single vulnerable product. What looks like a hospitality (booking.com) problem today can become shipping, HR or finance tomorrow with the same playbook.

So, how do we fight back? Security teams need to break the attack chain where they have the most control: people, privileges, and permitted tools. Train everyone not to run commands just because a web page or verification screen says so. Remind everyone to only check reservations or refunds through the real booking portal or by calling a trusted number. Lock things down further by only allowing developer tools (like MSBuild) on systems that need them, cut back on local admin rights, ensure strong logging, and use tooling to block risky scripts and suspicious process chains (like a browser suddenly launching PowerShell and then MSBuild).

Finally, treat RAT deployment as an incident with follow-on risk. These tools usually mean someone’s poking around, stealing credentials, or setting up more attacks. Be ready to look for signs like unexpected Defender settings, persistence via Startup folder entries, anomalous MSBuild activity, or unexpected outbound traffic. Move fast to quarantine infected machines and reset credentials. 

Note that the campaign targeted European hospitality in late December 2025, timing and sector selection that reinforce how attackers know when to strike for maximum impact.

Kern Smith, Senior Vice President of Global Solutions Engineering at Zimperium:

Campaigns such as this highlight how attackers increasingly rely on social engineering and trusted brand impersonation to bypass traditional controls and these tactics don’t stop at desktops. We routinely see the same lures adapted for mobile delivery, where phishing links, fake CAPTCHAs, and malicious redirects are even harder for users to detect. As attackers refine these deception-based techniques, organizations should assume global spread is inevitable and focus on protecting the device itself. Security teams need continuous, on-device threat detection that can identify malicious links, command execution attempts, and post-click behavior in real time, especially on mobile endpoints that sit outside the visibility of legacy email and network defenses.

Attackers are using techniques like click-fix and fake system errors because they exploit human behavior and the gaps created as work increasingly happens on mobile devices. A mobile-first attack strategy allows threat actors to bypass traditional perimeter, email, and network defenses by pushing users to interact directly with malicious content on their phones, where visibility and enforcement are often weaker. By combining trusted brand lures, browser-based deception, and post-click execution, attackers can scale these campaigns globally with a higher success rate and lower risk of detection.

Lionel Litty, Chief Information Security Officer and Chief Security Architect at Menlo Security:

Displaying a fullscreen BSOD is a key part of tricking the user here. Perhaps surprisingly, a website can enter fullscreen mode without requiring a browser permission prompt. The only prerequisite is a user action that demonstrates the user is interacting with the page. In this attack, this is achieved by having the user click “Reload” on the first fake error page. This serves as a stark reminder of the security risks that come with browsers exposing powerful APIs to untrusted web pages.

KEYWORDS: malware social engineering threat intelligence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Fingerprint on computer board

Enhancing Incident Response with Integrated Access Control and Video Verification

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Woman in suit

Can the Industry Do More for Women in Security?

An Opened Lock Standing Out From Locked Locks

From the Outside In: A Smarter Approach to Vendor Access

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Lit up globe

    A new malware named “Voldemort” may be a cyber espionage campaign

    See More
  • Keyboard

    New ZuRu Malware Variant Targeting Developers

    See More
  • Mac

    Security leaders discuss new phishing campaign targeting Mac users

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing